摘要:
Examples disclosed herein provide systems, methods, and software for communication using Common Public Radio Interface. In one example, a system for CPRI communication includes a radio equipment control system configured to generate a timing security flag for a basic frame, insert the security flag into the basic frame, and initiate transfer of the basic frame to a radio equipment system. The radio equipment system is further configured to receive the basic frame, identify validity of the timing security flag, and upon validation, update timing on the radio equipment.
摘要:
An electronic device. The device comprises an anti-trusted-security-zone in the trusted security zone that, when installed and managed by the trusted security zone manager, places non-trusted applications into the anti-trusted-security-zone for execution, restricts access of the non-trusted applications to at least some resources of the electronic device outside the anti-trusted-security-zone, alerts the user when the non-trusted application inside the anti-trusted-security-zone desires access to any restricted resource of the electronic device outside the anti-trusted-security-zone, asks the user for permission to access the desired resource outside the anti-trusted-security-zone, grants access for the non-trusted application to requested resources outside the anti-trusted-security-zone upon the permission by the user, moves the applications from the anti-trusted-security-zone to the normal zone that are determined not to be malicious, keeps the applications within the anti-trusted-security-zone that do not need to execute outside the anti-trusted-security-zone, and deletes the applications that are determined to be malicious.
摘要:
Systems, methods, and software for operating communication systems and wireless communication devices are provided herein. In one example, a method of operating a wireless communication is provided. In security circuitry of the wireless communication device, the method includes receiving a request from processing circuitry for an application to access a first communication network with a first communication transceiver, and processing the request and a security key to authorize the application to use the first communication transceiver to access the first communication network. In the first communication transceiver, the method includes exchanging communications over the first communication network for the application responsive to the authorization. In the security circuitry, the method also includes identifying that the application is using a second unauthorized communication transceiver, and in response, terminating the authorization for the application to use the first communication transceiver to access the first communication network.
摘要:
A wireless communication system to secure data communications between APIs. The wireless communication system includes a first API for a first sensor in a first wireless communication device and a second API for a second sensor in a second wireless communication device. In the first wireless communication device, identifying an API request to externally share sensor data, and in response, performing a security challenge to verify the first API. If the first API is verified, then the API request is transferred to the second wireless communication device. In the second wireless communication device, performing a security challenge to verify the second API. If the second API is verified, then the API share request is transferred to the second API in the second wireless communication device.
摘要:
A user equipment. The user equipment comprises a processor, a memory, a trusted security zone, wherein the trusted security zone provides hardware assisted trust, a ticket generator stored in the trusted security zone to generate a plurality of access codes, and a code generator stored in the trusted security zone. The code generator generates a different one-time-password for each of the plurality of access codes, wherein the one-time-password is not displayed on the user equipment, stores the one-time-password in the trusted security zone, and transmits the one-time-password to a trusted server through a trusted channel. Responsive to an associated access code from the plurality of access codes being displayed and upon request of a user of the user equipment, the code generator displays the one-time-password and invalidates the one-time-password promptly after the display ends.
摘要:
Systems, methods, and software for operating communication systems are provided herein. In one example, method of operating a communication system to establish secure communications between a first user device communicating in a first communication network and a second user device communicating in a second communication network is presented. The method includes, responsive to a communication request received from the first user device, establishing a secure communication link between the first user device and a first security node. When a second security node has a security relationship established with the first security node, the method includes establishing the secure communication link for the secure communications between the first user device and the second user device using at least the security relationship between the first security node and the second security node, and exchanging the secure communications over the secure communication link.
摘要:
A system for providing a trusted bearer communication link in a long term evolution (LTE) wireless network. The system attaches a mobile communication device to the long term wireless network. An enhanced node B processes a trust zone request from the mobile communication device. The enhanced node B processes a trust zone service request from the mobile communication device. The enhanced node B interworks with a home subscription server (HSS) and a policy control rules function (PCRF) server to verity the mobile communication device has a right to execute the requested trusted network service. The system established a trusted bearer communication link between the mobile communication device and the long term evolution wireless network.
摘要:
Embodiments of the disclosure relate generally to methods and systems for transmitting and displaying digital ticket documentation. A mobile communication device may comprise one or more keys that are specific for the device, wherein the keys are stored in a trusted security zone on the mobile device. In some embodiments, the keys may be associated with a specific ticket provider. The keys may be used to processes one or more datasets received from a ticket provider, wherein processing the dataset(s) may generate a digital ticket. The ticket may be generated and stored in the trusted security zone of the mobile device. The mobile device may be operable to present the ticket via the user interface of the mobile device and/or a near field communication transceiver of the mobile device.
摘要:
Embodiments relate generally to systems and methods for generating and using user specific keys to execute one or more secure application in a trusted security zone of a mobile device. The user specific keys may be used in place of a trusted security zone master key and may be generated based on the trusted security zone master key. The trusted security zone master key and the user specific keys may be stored in the trusted security zone. A trusted security zone key may be used to verify the identity of a user and/or mobile device when executing in the trusted security zone. It may be tied to a particular user and may be known by a trusted service manager in communication with the mobile device.
摘要:
A method of configuring a trusted security zone into a portable electronic device. The method comprises executing instructions on a processor of the portable electronic device that determine the state of a JTAG (JTAG) port of the portable electronic device, if the JTAG port is determined to be enabled, executing instructions on the processor preventing configuration of the trusted security zone into the portable electronic device, and if the JTAG port is determined to be disabled, configuring the trusted security zone into the portable electronic device, whereby a vulnerability to hacking the trusted security zone via an enabled JTAG port is reduced.